Preview

How Technology Advancement has influenced Computer Ethics

Good Essays
Open Document
Open Document
1067 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How Technology Advancement has influenced Computer Ethics
How Technology Advancement has influenced Computer Ethics
Name:
Professor:
Course
Date:

How Technology Advancement has influenced Computer Ethics The 21st century has been dubbed ”the digital age” because of the monumental achievements witnessed in the Information, Communication and Technology (ICT) fields, which have impacted every aspect of human life. The internet has become one of the most lucrative Information Technology (IT) tool which has made communication and exchange of information faster and efficient. Consequently, it has transformed how people consume information. In spite of its benefits, the internet has led to a severe decline in ethics among internet users (Salman, Saad & Ali, 2013). The widespread use of internet has led to increased and sophisticated crimes, terrorism and wars (May, 2004). This essay will be based on a case involving hackers who hold Personal Computers (PC) hostage. It will outline the potential computer ethics issues associated with holding computers hostage. It will also highlight methods that computer users could use to prevent this type of attack. Moreover, it will highlight governmental legislations that could be enacted against this type of attack. Ethics is defined as the principles governing both right and wrong among free humans (free moral agents), whose actions are influenced by their freedom of choice (Soskolne, n.d). Advancement of technology presents both positive and negative impacts to a society. Technological advancements have led to a rapid decline in social and ethical issues regarding to security and privacy of personal information (Shieh & Tanthuwanit, 2004). One of the major forms of social ethic violation includes hackers holding personal computers hostage, and hence infringing on both privacy and security of targeted computer users. This in turn compromises information security concerned with the protection of information confidentiality, availability and integrity (Gordon &



References: Colombell, M., R. (2002). The Legislative Response to the Evolution of Computer Viruses. 8 RICH. J.L. & TECH. 18. Retrieved from < http://jolt.richmond.edu/v8i3/article18.html> French, A., M Gordon, L., & Loeb, M. (2002). The Economics of Information Security Investment. ACM Transactions on Information and System Security, 5 (4), 438–457. May, M. (2004). Federal Computer Crime Laws. SANS Institute. Retrieved from < http://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws- 1446? Show=federal-computer-crime-laws-1446&cat=legal > Perlroth, N Shieh, M., & Tanthuwanit, K. (2004). Privacy and Security: Internet Hacking and Surveillance The Canadian Press (2014, April 14).  Computer hacking expert says more bad news to come from Heartbleed. Edmonton Journal. Retrieved from

You May Also Find These Documents Helpful

  • Good Essays

    Companies like Google are straying away from the once popular Virtual Reality, in favor of what they are calling “Augmented Reality”, or AR. According to Merriam-Webster, AR is “an enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device (as a smartphone camera); also: the technology used to create augmented reality.” (Merriam-Webster, n.d.) In order to “augment” our realities, these technologies are recording, storing, altering, and displaying information in real time. The information they use can be anything, but with products like Google Glass, wearable technology can now modify what and how we see objects, people, or data, in real time.…

    • 874 Words
    • 4 Pages
    Good Essays
  • Better Essays

    20142321 SIYIWANG TACC403

    • 2051 Words
    • 7 Pages

    4. K. Himma. (2004). The Ethics of Tracing Hacker Attacks Through the Machines of Innocent Persons. International Journal of Information Ethics. vol. 2, pp. (4), p1-13.…

    • 2051 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Camus view of the world was seen to have centred on life, the meaning and values of existence, and how absurd it all was. The view of the absurd was a man 's futile search for meaning, unity and clarity in the face of an unintelligible world devoid of God, eternal truths and values. Which then implies that there is an absence of any reasons to live there being no predefined purpose to the world or universe. To which the answer seems to be suicide, to remove yourself from a world that is decidedly strange and unfamiliar. Yet Camus does not seem to feel this is the answer that suicide is not the revolt although it certainly seems to be upon first glance. Camus feels that to revolt one must continue to live the absurd, to find your own values and meaning through your experiences of life. That even Sisyphus is happy through his eternal task. Cast as an absurd hero Camus uses Sisyphus as a metaphor for humanity, yet he says that we must imagine Sisyphus happy in his absurd predicament of meaningless work.…

    • 1136 Words
    • 5 Pages
    Better Essays
  • Better Essays

    A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used. Computers provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, that is, formulate policies to guide our actions …. One difficulty is that along with a policy vacuum there is often a conceptual vacuum. Although a problem in computer ethics may seem clear initially, a little reflection reveals a conceptual muddle. What is needed in such cases is an analysis that provides a coherent conceptual framework within which to formulate a policy for action. (Moor, 1985, 266)…

    • 1719 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Computer and Web Ethics

    • 1530 Words
    • 7 Pages

    With the freedom of the computer has come a multitude of new ethical issues. Computer ethics is a set of moral principles that systematize the use of computers and supervise the behavior of a group or individual. This essay will tell how computer ethics came about. We will discuss the “Ten Commandments of Computer Ethics.” Having the use of a computer for business, academic, or just for social reasons entitles you to know and follow these ethics. Do you apply computer ethics when spending time on the internet? At the end of this essay ask yourself this question again and give an honest answer. If your answer is no then correct the issue and apply them now. Ethics in computing are social-justice issues, commerce, computer abuse, speech issues, intellectual property, basics, privacy, and risks. We will discuss each of these issues in this essay. By the end of this essay you will have the knowledge of computer and web ethics to apply to your daily use of a computer.…

    • 1530 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    3 1 CSR Journal 1

    • 474 Words
    • 2 Pages

    If you were the CSR officer for a company of your choosing, what would your CSR strategy be and what issues would you focus on? Identify the stakeholders this strategy applies to. Describe the impact of the competitive forces shaping your strategy.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Need for Cyber Ethics

    • 1591 Words
    • 7 Pages

    In summary, cyberspace has become an interactive world that many of us have fully integrated into our lives. There is dark side to this phenomenon. The ease and anonymity by which we are able to perform all and many more of these feats of contact and access with an entire universe of places and people have created a dilemma: the need of cyber ethics.…

    • 1591 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Ethics

    • 1351 Words
    • 6 Pages

    * Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks…

    • 1351 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Computer "Law"

    • 1833 Words
    • 8 Pages

    In the world of Information Technology the one thing that is king above all others should be the security of the device or network a person is on because if they feel that they can’t trust the network or device it is more than likely not going to be used. We live in a world that is consistently changing and so are the criminals, so therefore the justice system must change along with it to make sure it can counter anything that does arise. Also in this world beyond just the laws that are put into place there can be ethical boundaries that are also put into place that aren’t actually law but shouldn’t have to be because it should just be common knowledge.…

    • 1833 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Information Tecnology

    • 571 Words
    • 3 Pages

    People often make ethical decisions about how to use freedom and power daily. Information technology (IT) is the application of computers and telecommunication equipment to store, retrieve, transmit, and manipulate data (Reynolds, 2009). The Internet allows a worldwide exchange of news, ideas, opinions, rumors, and information. The first amendment protects Americans rights to freedom of religion and freedom of expression. Many Internet websites were deemed indecent and inappropriate.…

    • 571 Words
    • 3 Pages
    Satisfactory Essays